Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks., and . CoRR, (2023)Detection of Electromagnetic Interference Attacks on Sensor Systems., and . SP, page 203-216. IEEE, (2020)What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS., and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 468-487. Springer, (2018)Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing., , , and . ARES, page 10:1-10:11. ACM, (2022)On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name., and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 213-228. Springer, (2018)Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems., and . PST, page 1-10. IEEE, (2019)Targeted Detection for Attacks on the MIL-STD-1553 Bus., and . IEEE Trans. Aerosp. Electron. Syst., 60 (1): 548-557 (February 2024)BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy., , , and . AsiaCCS, page 196-207. ACM, (2022)Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance., and . WOOT @ USENIX Security Symposium, page 245-261. USENIX Association, (2024)An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks., and . AsiaCCS, page 481-493. ACM, (2023)